Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Size: px
Start display at page:

Download "Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages"

Transcription

1 Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Contact during the exam: English (original) Name: Yuming Jiang Tlf.: The exam rooms will be visited in the time period between 16:00 and 17:00. Exam in course: "TTM4100 COMMUNICATION SERVICES AND NETWORKS" 20 May :00 19:00 Grading results 12 June 2009 (This is the date for sending the results from the Department of Telematics to the Student and Academic Division of NTNU) Remedies: D: No printed or handwritten remedies allowed. Determined, simple calculator allowed. Rules: 1/8

2 The problem set consists of two parts: Part I, the problem specifications pages (numbered pages 1 to 8), define the rules to follow and the questions to be answered. Part II, the answer pages (numbered pages 1 to 14), include Written text fields and the answer alternatives for choice-type questions. The rules must be followed when answering the questions. Part II also includes 3 pages where you may give comments related to formal issues about Part I or Part II, or the exam in general. These pages may also be used for Written text answers. The sensors will read and decide how to use the comments. The answer pages (Part II) shall be delivered as your answer. Two copies of Part II are handed out. Only one copy shall be delivered as your answer. The student number should be written on all answer pages (Part II) with digits. Follow the rules below to avoid wrong interpretations. Use blue or black ballpoint-pen, not a pencil. Check the boxes as clear as you can, like this: If you check the wrong box, fill it completely, like this: Then check the correct box. Other correction methods e.g. use of eraser, correcting fluid, etc., are not permitted Do not write outside the box fields or the student number fields. 2/8

3 Score The maximum score for the exam is 100 points. A sub-problem has a defined maximum score of X points. A sub-problem may be defined by using various types of box fields. In this exam we mainly have two different types of box fields: Written text. A sub - problem shall be answered by written text. In that case the answer shall be written in the supplied marked box in the answer page. The answer can give from 0 to max X points. True or False: Check one box per statement, or do not check. If True and False both are checked for a statement, it counts as an incorrect mark. If the sub-problem has M statements and the maximum score for this subproblem is X points, then the resulting score is calculated as follows: X Points = dif * -----, where dif is the difference between the number of M correct marks and the number of discounts points and where discount points are found from the Table below. number of discount points incorrect marks ,5 i >= 3 i Formally we have: dif =Max{(number of correct marks discount points), 0}, This mapping between incorrect marks and discount points allows you to guess wrong once without being punished. Note that the True or False problem does not give incorrect marks if you do not check any of the two boxes for a given statement. 3/8

4 1. True or False questions. (50 points) 1.1 Application Layer (10 points) A Layer offering a connection-oriented service must use a connection-oriented protocol When a data packet moves from the upper layer to the lower layers, headers are added With non-persistent connections between browser and origin server, it is possible for a single TCP segment to carry two distinct HTTP request messages For a P2P file-sharing application, there is no notion of client and server sides of a communication session A machine with a single DNS name can have multiple IP addresses does not use DNS POP3 servers do not carry state information across POP3 sessions Only SMTP can be used between a user mail agent and an Internet mail server A user requests a Web page that consists of some text and two images. For this page, the client will send one request message and receive three response messages Two distinct Web pages (for example, and can be sent over the same persistent connection. 1.2 Transport Layer (10 points) Transport layer protocol data units are processed by both routers and end hosts All transport layer protocols must perform flow control In a Go-Back-N protocol, the sender is generally allowed to transmit multiple packets without waiting for an acknowledgment TCP provides message stream transport service When TCP is used, the TCP port number at the receiver side must be the same as the sender side UDP is not a reliable protocol Suppose Host A is sending a large file to Host B over a TCP connection. If the sequence number for a segment of this connection is n, then the sequence number for the subsequent segment will necessarily be n Suppose Host A sends two TCP segments back to back to Host B over a TCP connection. The first segment has sequence number 90; the second has sequence number 110. Then, there are 20 bytes is in the first segment Suppose Host A sends one segment with sequence number 38 and 4 bytes of data over a TCP connection to Host B. In this same segment the acknowledgment number is necessarily Suppose a process in Host C has a UDP socket with port number Suppose both Host A and Host B each send a UDP segment to Host C with destination port number Then, both of these segments will be directed to the same socket at Host C. 4/8

5 1.3 Network Layer (10 points) The Network Layer is responsible for providing reliable end-to-end transmission The service provided by the Internet Network Layer is connectionless The 32-bit binary equivalent of the IP address is IP guarantees that the packets will arrive in the right sequence The forwarding process of a router is responsible for transferring a packet from an incoming link to an outgoing link In a packet-switched network, routers must remember what connection each packet belongs to Each interface of a router in the Internet should have one IP address In the Internet, a node may receive multiple copies of the same packet With DHCP, a host may be assigned an IP address that is different each time the host is connected to the network NAT (Network Address Translation) is used to translate hostnames into IP addresses. 1.4 Link Layer and LANs (10 points) Link layer also needs to provide flow control Error control based on even parity means that a parity bit is added so that the number of 1 s is even CRC (Cyclic Redundancy Check) detects all errors In CRC (Cyclic Redundancy Check), the generator polynomials used by the sender and the receiver need not be the same Dividing the binary value by 1001 using modulo-2 without carries gives a remainder of Bridges use IP addresses to route frames to their destinations Hubs use the frame destination address to route frames to their destination The slotted ALOHA protocol is more efficient than the pure ALOHA Ethernet provides connectionless service to the network layer If all the links in the Internet were to provide reliable delivery service, then the TCP reliable delivery service would be redundant. 5/8

6 1.5 Wireless Networks, Multimedia Networking and Miscellaneous (10 points) Ethernet and use the same frame structure Hosts associated with a base station are often referred to as operating in infrastructure mode, where traditional network services, such as address assignment and routing, are provided by the network to which a host is connected via the base station Before an station transmits a data frame, it must first send an RTS (Request to Send) frame and receive a corresponding CTS (Clear to Send) frame It is possible for a CDN (Content Distribution Network) to provide worse performance to a host requesting a multimedia object than if the host has requested the object directly from the distant origin server Circuit switching gives higher variation in the end-to-end transfer time than packet switching In a packet switching network, assume that all packets have the same length and the queuing delay is ignored. Then, for the connection-oriented service, the connection setup time is always longer than the propagation time of a packet from the sender to the receiver In order to maintain registration, SIP (Session Initiation Protocol) clients must periodically send REGISTER messages If stored video is streamed directly from a Web server to a media player, the application is using TCP as the underlying transport protocol FTP runs on top of UDP RTSP (Real-Time Streaming Protocol) does not restrict how streamed media is transported. 6/8

7 2. Explain connection-oriented service and connectionless service: (10 points) 2.1.Explain connection-oriented service. 2.2.Explain connectionless service. 2.3.What is the principal difference between connection-oriented service and connectionless service? 3. In a packet-switched network, when a packet travels through the network, the packet suffers from several types of delays. (10 points) 3.1.Consider a packet of length L which begins at end system A, travels over one link to a packet switch, and travels from the packet switch over a second link to a destination end system. Let di, si and Ri denote the length, propagation speed, and the transmission rate of link i, for i = 1,2. The packet switch delays each packet by dproc. Suppose now the packet length is 1000 bytes, the propagation speed on both links is s1 = s2 = m/s, the transmission rates of both links is R1 = R2 =1 Mbps, the packet switch processing delay is dproc =2 msec, the length of the first link is 6000 km, and the length of the last link is 3000 km. Assuming no queuing delays, what is the total end-to-end delay for the packet? 3.2.Suppose N=100 packets arrive simultaneously to a link at which no packets are currently being transmitted or queued. Each packet is of length L=1000 bytes and the link has transmission rate R=1 Mbps. What is the average queuing delay for these packets? 4. Flow control is needed in communication networks. (10 points) 4.1 What is flow control? 4.2 Which Layer (or Layers) may implement flow control? Explain why. 4.3 Explain stop-and-wait flow control. 4.4 Discuss two disadvantages or problems of stop-and-wait flow control. 4.5 Assume the propagation delay between the sender and receiver is 100ms, and the maximum packet size is 1500 bytes. What is the maximum data rate that can be achieved by stop-and-wait flow control? 7/8

8 5. Consider a datagram network using 32-bit addresses. (10 points) 5.1.Suppose a router in the network has the following (classless inter-domain routing) entries in its routing table: Address/mask Next hop /22 Interface /22 Interface /23 Router 1 Default Router 2 For each of the following IP addresses, what does the router do if a packet with the following address arrives? Suppose in the network there is a router that interconnects three subnets: Subnet 1, Subnet 2, and Subnet 3. Suppose all of the interfaces in each of these three subnets are required to have the prefix /24. Also suppose that Subnet 1 is required to support up to 125 interfaces, and Subnet 2 and Subnet 3 are each required to support up to 60 interfaces. Provide three network addresses (of the form a.b.c.d/x) that satisfy these constraints 6. DNS (Domain Name System) is used in the Internet. (10 points) 6.1.Explain why DNS is needed for the Internet, and give two Internet applications that use DNS. 6.2.Internet DNS uses UDP instead of TCP. If a DNS packet is lost, there is no automatic recovery. Does this cause a problem? Why? 6.3.The Internet DNS name space is divided into zones. Normally how many DNS servers are used for a zone? Why? 8/8

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages

More information

Final for ECE374 05/06/13 Solution!!

Final for ECE374 05/06/13 Solution!! 1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -

More information

CS413: Computer Networks

CS413: Computer Networks CS413: Computer Networks 2005 Fall Term Midterm Exam Solution Student ID: Name: Problem No. Marks Your Marks 1 16 2 5 3 5 4 7 5 4 6 7 7 3 8 3 Total 50 1 [Marking schemes are given in blue color and the

More information

Transport and Network Layer

Transport and Network Layer Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a

More information

The OSI and TCP/IP Models. Lesson 2

The OSI and TCP/IP Models. Lesson 2 The OSI and TCP/IP Models Lesson 2 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Introduction to the OSI Model Compare the layers of the OSI and TCP/IP

More information

EKSAMEN / EXAM TTM

EKSAMEN / EXAM TTM 1.1 1.1.1...... 1.1.6...... 1.1.2...... 1.1.3..... 1.1.4...... 1.1.5..... 1.1.7...... 1.1.8..... 1.1.9...... 1.1.10... 1.2 1.2.1...... 1.2.2...... 1.2.3..... 1.2.4...... 1.2.5..... 1.2.6...... 1.2.7......

More information

Outline: Introduction

Outline: Introduction Outline: Introduction Last class recap a. Internet is made up of hosts (end systems), communication links, and packet switches). Hosts and packet switches run various networking protocols and work together

More information

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst Data communication in reality In reality, the source and destination hosts are very seldom on the same network, for

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

First Semester Examinations 2011/12 INTERNET PRINCIPLES

First Semester Examinations 2011/12 INTERNET PRINCIPLES PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES

More information

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1

The OSI Model and the TCP/IP Protocol Suite. Pritee Parwekar ANITS 1 The OSI Model and the TCP/IP Protocol Suite Pritee Parwekar ANITS 1 To study To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss

More information

First Midterm for ECE374 03/09/12 Solution!!

First Midterm for ECE374 03/09/12 Solution!! 1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam

More information

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches?

6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? TUTORIAL 2 (EKT 332) 6.1. Why do LANs tend to use broadcast networks? Why not use networks consisting of multiplexers and switches? Why broadcast network? -The computers in a LAN are separated by a short

More information

Tutorial 1 Solutions (Week 5)

Tutorial 1 Solutions (Week 5) COMP 333/933 Computer Networks and Applications Tutorial Solutions (Week 5) Introduction Suppose two hosts, A and B are separated by, kms and are connected by a direct link of R = Mbps. Suppose the propagation

More information

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model

Introduction OSI Model Open Systems Interconnection OSI OSI Seven Layer Model OSI MODEL 1 Introduction Open Systems Interconnection Basic Reference Model (OSI Reference Model or OSI Model) is an abstract description for layered communications and computer network protocol design.

More information

Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview:

Chapter 1: Introduction. Chapter 1: roadmap. Our goal: Overview: Chapter 1: Introduction Our goal: get feel and terminology more depth, detail later in course approach: use Internet as example Overview: what s the Internet what s a protocol? network edge network core

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Circuit vs. Packet Switching

Circuit vs. Packet Switching Circuit vs. Packet Switching 1 Taxonomy of Switched Wide Area Networks WAN Telecommunication Systems intelligent core dumb nodes Circuit-Switched Networks (e.g. telephone networks) dumb core intelligent

More information

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology

Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student

More information

Lecture 28: Internet Protocols

Lecture 28: Internet Protocols Lecture 28: Internet Protocols 15-110 Principles of Computing, Spring 2016 Dilsun Kaynar, Margaret Reid-Miller, Stephanie Balzer Reminder: Exam 2 Exam 2 will take place next Monday, on April 4. Further

More information

Understand the OSI Model

Understand the OSI Model Understand the OSI Model Part 2 Lesson Overview In this lesson, you will learn information about: Frames Packets Segments TCP TCP/IP Model Well-known ports for most-used purposes Anticipatory Set Review

More information

USN 06EC71 Seventh Semester D.E. Degree Examination, December 2010 Computer Communication Networks Time: 3 hrs. Note: Answer any FIVE full questions, selecting at least TWO questions/rom each part. Max.

More information

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS

INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK Lesson-24: INTERNET ENABLED SYSTEMS NETWORK PROTOCOLS 1 Internet enabled embedded system Communication to other on the Internet. Use html (hyper text

More information

Answers to Sample Questions on Network Layer

Answers to Sample Questions on Network Layer Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

CS335 Sample Questions for Exam #2

CS335 Sample Questions for Exam #2 CS335 Sample Questions for Exam #2.) Compare connection-oriented with connectionless protocols. What type of protocol is IP? How about TCP and UDP? Connection-oriented protocols Require a setup time to

More information

Internet Technologies 3-Networking. F. Ricci 2010/2011

Internet Technologies 3-Networking. F. Ricci 2010/2011 Internet Technologies 3-Networking F. Ricci 2010/2011 Content Protocol Hierarchies Services and protocols Service Primitives Connection-Oriented and Connectionless Services Reference models OSI reference

More information

CS 421: Computer Networks FALL MIDTERM I November 22, minutes

CS 421: Computer Networks FALL MIDTERM I November 22, minutes CS 421: Computer Networks FALL 2004 MIDTERM I November 22, 2004 120 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with

More information

Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567.

Tutorial Questions EG/ES The tutorial questions illustrate the style of examination questions for EG/ES 3567. The tutorial questions illustrate the style of examination questions for EG/ES 3567. The paper will be of 3 hours duration, and each student should attempt four questions during this time. You should aim

More information

Packet Switched Networks

Packet Switched Networks Packet Switched Networks Acknowledgements These Slides have been adapted from the originals made available by J. Kurose and K. Ross All material copyright 1996-2009 J.F Kurose and K.W. Ross, All Rights

More information

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments

INTERNET PROTOCOLS. Transmission Control Protocol TCP. TCP Services. Stream Deliver Service. Sending and Receiving Buffers. Bytes and Segments INTERNET PROTOCOLS http://www.tutorialspoint.com/internet_technologies/internet_protocols.htm Copyright tutorialspoint.com Transmission Control Protocol TCP TCP is a connection oriented protocol and offers

More information

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing

Internet Protocol (IP) IP - Network Layer. IP Routing. Advantages of Connectionless. CSCE 515: Computer Network Programming ------ IP routing Process Process Process Layer CSCE 515: Computer Network Programming ------ IP routing Wenyuan Xu ICMP, AP & AP TCP IP UDP Transport Layer Network Layer Department of Computer Science and Engineering University

More information

Exam 1 Review Questions

Exam 1 Review Questions CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web

More information

Transport Layer Protocols

Transport Layer Protocols Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements

More information

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA) Lecture 15 IP Address Each host and router on the Internet has an IP address, which consist of a combination of network number and host number. The combination is unique; no two machines have the same

More information

Ethernet. Ethernet. Network Devices

Ethernet. Ethernet. Network Devices Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking

More information

WAN Data Link Protocols

WAN Data Link Protocols WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data

More information

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone

More information

Chapter 2 NETWORK LAYER

Chapter 2 NETWORK LAYER Chapter 2 NETWORK LAYER This chapter provides an overview of the most important and common protocols associated with the TCP/IP network layer. These include: Internet Protocol (IP), Routing protocols Routing

More information

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination

COMP 361 Computer Communications Networks. Fall Semester 2003. Midterm Examination COMP 361 Computer Communications Networks Fall Semester 2003 Midterm Examination Date: October 23, 2003, Time 18:30pm --19:50pm Name: Student ID: Email: Instructions: 1. This is a closed book exam 2. This

More information

Chapter 6 Network Communications and Protocols

Chapter 6 Network Communications and Protocols Chapter 6 Network Communications and Protocols Objectives Explain the function of protocols in a network Describe common protocol suites Guide to Networking Essentials, Fifth Edition 2 Protocols Strictly

More information

Network layer: Overview. Network layer functions IP Routing and forwarding

Network layer: Overview. Network layer functions IP Routing and forwarding Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

Protocols and Architecture. Protocol Architecture.

Protocols and Architecture. Protocol Architecture. Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between

More information

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31

IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31 IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011

More information

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0)

Network Basics GRAPHISOFT. for connecting to a BIM Server. 2009 (version 1.0) for connecting to a BIM Server GRAPHISOFT 2009 (version 1.0) Basic Vocabulary...3 Local Area Networks...5 Examples of Local Area Networks...5 Example 1: LAN of two computers without any other network devices...5

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Protocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer

Protocol Stack: ISO OSI Model. Layer 2: Data Link Layer. Layer 1: Physical Layer. Layer 4: Transport Layer. Layer 3: Network Layer Protocol Stack: ISO OSI Model CSCE 515: Computer Programming OSI Models & layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina Some slides are made by Dave Hollinger

More information

Module 11: TCP/IP Transport and Application Layers

Module 11: TCP/IP Transport and Application Layers Module 11: TCP/IP Transport and Application Layers 11.1 TCP/IP Transport Layer 11.1.1 Introduction to the TCP/IP transport layer The primary duties of the transport layer are to transport and regulate

More information

Router Architecture Overview. Input Port Functions. Switching Via Memory. Three types of switching fabrics. Switching Via a Bus

Router Architecture Overview. Input Port Functions. Switching Via Memory. Three types of switching fabrics. Switching Via a Bus Router Architecture Overview Two key router functions: run routing algorithms/protocol (RIP, OSPF, BGP) forwarding grams from incoming to outgoing link Input Port Functions Physical layer: bit-level reception

More information

TCP/IP Tutorial. Transmission Control Protocol Internet Protocol

TCP/IP Tutorial. Transmission Control Protocol Internet Protocol TCP/IP Tutorial Transmission Control Protocol Internet Protocol 1 TCP/IP & OSI In OSI reference model terminology -the TCP/IP protocol suite covers the network and transport layers. TCP/IP can be used

More information

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------

Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------ Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------

More information

Network Models and Protocols

Network Models and Protocols 669-5ch01.fm Page 1 Friday, April 12, 2002 2:01 PM C H A P T E R Network Models and Protocols 1 EXAM OBJECTIVES 1.1 Layered Network Models 1.2 The Layers of the TCP/IP 5-Layer Model 1.3 Network Protocols

More information

DIN 2012 Tutorial. physical links between primary and secondary stations: Synchronous Connection Oriented (SCO); Asynchronous Connection Link (ACL).

DIN 2012 Tutorial. physical links between primary and secondary stations: Synchronous Connection Oriented (SCO); Asynchronous Connection Link (ACL). DIN 2012 Tutorial (Q1a) In the IEEE 802.15 standard (Bluetooth), describe the following two types of : physical links between primary and secondary stations: (i) (ii) Synchronous Connection Oriented (SCO);

More information

CS101 Lecture 19: Internetworking. What You ll Learn Today

CS101 Lecture 19: Internetworking. What You ll Learn Today CS101 Lecture 19: Internetworking Internet Protocol IP Addresses Routing Domain Name Services Aaron Stevens (azs@bu.edu) 6 March 2013 What You ll Learn Today What is the Internet? What does Internet Protocol

More information

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM

ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A

More information

Network Architecture and the OSI Reference Model

Network Architecture and the OSI Reference Model Network Architecture and the OSI Reference Model Advanced Computer Networks D12 Architecture Outline The Internet and IP Network Architecture Protocols and s Encapsulation The OSI Reference Model The Seven

More information

Second Midterm for ECE374 04/08/15 Solution!!

Second Midterm for ECE374 04/08/15 Solution!! ECE374: First Midterm 1 Second Midterm for ECE374 04/08/15 Solution!! Instructions: a. Put your name and student number on each sheet of paper! b. The exam is closed book. c. You have 90 minutes to complete

More information

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer

More information

CSE 3461: Introduction to Computer Networking and Internet Technologies. Packet Switching. Presentation G

CSE 3461: Introduction to Computer Networking and Internet Technologies. Packet Switching. Presentation G CSE 3461: Introduction to Computer Networking and Internet Technologies Packet Switching Presentation G Study: 10.5, 10.6, 12.1, 12.2, 13.1, 13.2, 18.3, 18.4 Gojko Babić 10-09-2012 The Network Core mesh

More information

Internet Protocols. Supporting Protocols and Framing. Updated: 9/30/14

Internet Protocols. Supporting Protocols and Framing. Updated: 9/30/14 Internet Protocols Supporting Protocols and Framing Updated: 9/30/14 Supporting Protocols ARP / RARP BOOTP ICMP DHCP NAT IP Supporting Protocols IP protocol only deals with the data transfer (best-effort)

More information

Computer Networks Homework 1

Computer Networks Homework 1 Computer Networks Homework 1 Reference Solution 1. (15%) Suppose users share a 1 Mbps link. Also suppose each user requires 100 kbps when transmitting, but each user transmits only 10 percent of the time.

More information

IP Subnetting and Addressing

IP Subnetting and Addressing Indian Institute of Technology Kharagpur IP Subnetting and Addressing Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 6: IP Subnetting and Addressing

More information

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration

Interconnection of Heterogeneous Networks. Internetworking. Service model. Addressing Address mapping Automatic host configuration Interconnection of Heterogeneous Networks Internetworking Service model Addressing Address mapping Automatic host configuration Wireless LAN network@home outer Ethernet PPS Internet-Praktikum Internetworking

More information

Computer Networks and the Internet

Computer Networks and the Internet ? Computer the IMT2431 - Data Communication and Network Security January 7, 2008 ? Teachers are Lasse Øverlier and http://www.hig.no/~erikh Lectures and Lab in A126/A115 Course webpage http://www.hig.no/imt/in/emnesider/imt2431

More information

IP Basics Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA

IP Basics Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA IP Basics Unix/IP Preparation Course July 19, 2009 Eugene, Oregon, USA hervey@nsrc.org Layers Complex problems can be solved using the common divide and conquer principle. In this case the internals of

More information

TCP/IP Concepts Review. Ed Crowley

TCP/IP Concepts Review. Ed Crowley TCP/IP Concepts Review Ed Crowley 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP addressing

More information

TCP/IP and OSI model. TCP/IP Protocol (2) B.2

TCP/IP and OSI model. TCP/IP Protocol (2) B.2 TCP/IP Protocol TCP/IP Transmission Control Protocol/Internetworking Protocol (TCP/IP) standard for the Internet five layers = physical = data link = network = transport = application B.1 TCP/IP and OSI

More information

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol

Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol

More information

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation

More information

From the previous lecture

From the previous lecture CS 640: Introduction to Computer Networks Aditya Akella Lecture 7 - IP: Addressing and Forwarding From the previous lecture We will cover spanning tree from the last lecture 2 Spanning Tree Bridges More

More information

IP addressing and forwarding Network layer

IP addressing and forwarding Network layer The Internet Network layer Host, router network layer functions: IP addressing and forwarding Network layer Routing protocols path selection RIP, OSPF, BGP Transport layer: TCP, UDP forwarding table IP

More information

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF

Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.

More information

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface

IP addressing. Interface: Connection between host, router and physical link. IP address: 32-bit identifier for host, router interface IP addressing IP address: 32-bit identifier for host, router interface Interface: Connection between host, router and physical link routers typically have multiple interfaces host may have multiple interfaces

More information

Real-Time Broadcast Video Services over the Internet using MPEG-DASH

Real-Time Broadcast Video Services over the Internet using MPEG-DASH over the Internet using MPEG-DASH Real-Time Broadcast Video Services over the Internet using MPEG-DASH Backhaul and Primary Distribution over the Internet does not require service contracts, special IT

More information

TCP/IP Concepts Review. A CEH Perspective

TCP/IP Concepts Review. A CEH Perspective TCP/IP Concepts Review A CEH Perspective 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers.

Cape Girardeau Career Center CISCO Networking Academy Bill Link, Instructor. 2.,,,, and are key services that ISPs can provide to all customers. Name: 1. What is an Enterprise network and how does it differ from a WAN? 2.,,,, and are key services that ISPs can provide to all customers. 3. Describe in detail what a managed service that an ISP might

More information

COMPUTER NETWORK TECHNOLOGY (300)

COMPUTER NETWORK TECHNOLOGY (300) Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant

More information

TCP/IP Basis. OSI Model

TCP/IP Basis. OSI Model TCP/IP Basis 高 雄 大 學 資 訊 工 程 學 系 嚴 力 行 Source OSI Model Destination Application Presentation Session Transport Network Data-Link Physical ENCAPSULATION DATA SEGMENT PACKET FRAME BITS 0101010101010101010

More information

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information

The Internet. The Internet. The Internet. What is the internet, and how does it work?

The Internet. The Internet. The Internet. What is the internet, and how does it work? ECS 15; Lectures 17 and 18 Final paper: The Abstract 1-2 sentences defining the research problem. What is the internet, and how does it work? 1-2 sentences explaining your approach. 1-2 sentences describing

More information

TCP/IP Concepts Review. A CEH Perspective

TCP/IP Concepts Review. A CEH Perspective TCP/IP Concepts Review A CEH Perspective 1 Objectives At the end of this unit, you will be able to: Describe the TCP/IP protocol stack For each level, explain roles and vulnerabilities Explain basic IP

More information

Local Area Networks: Internetworking

Local Area Networks: Internetworking Local Area Networks: Internetworking Chapter 81 Learning Objectives List the reasons for interconnecting multiple local area networks and interconnecting local area networks to wide area networks. Identify

More information

Network Layer: Network Layer and IP Protocol

Network Layer: Network Layer and IP Protocol 1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols

More information

Communication Systems I

Communication Systems I Communication Systems I Course Map Contents Recap of the networks we ve seen so far Basics of protocols HTTP example The OSI model Packet and Circuit switching Physical media What to expect next Recap

More information

4. MAC protocols and LANs

4. MAC protocols and LANs 4. MAC protocols and LANs 1 Outline MAC protocols and sublayers, LANs: Ethernet, Token ring and Token bus Logic Link Control (LLC) sublayer protocol Bridges: transparent (spanning tree), source routing

More information

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science

EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There

More information

Summer Workshop on Cyber Security

Summer Workshop on Cyber Security Summer Workshop on Cyber Security Computer s Security (Part 1) Dr. Hamed Mohsenian-Rad University of California at Riverside and Texas Tech University August 12-16, 2013 Supported by National Science Foundation

More information

Understanding the TCP/IP Internet Layer

Understanding the TCP/IP Internet Layer Lesson 4 Understanding the TCP/IP Internet Layer Overview Objectives There are various aspects to IP addressing, including calculations for constructing an IP address, classes of IP addresses designated

More information

UPPER LAYER SWITCHING

UPPER LAYER SWITCHING 52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information